1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
10

Exercise 3.16.4: Happy Face Solita

Computers and Technology
1 answer:
enot [183]3 years ago
7 0

first do a happy face and a circule thats it

You might be interested in
Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
Mkey [24]

Answer: Predetermined Overhead Rate, Estimated Manufacturing Overhead and Annual Activity Level.

Explanation:

Generally speaking, manufacturing overhead is applied to production by means of a predetermined overhead rate, which is computed under the general formula of dividing estimated overhead rate by some measure of the annual activity level.

A predetermined overhead rate is usually calculated at the beginning of an accounting period. It is calculated by dividing the estimated manufacturing overhead by an activity driver (e.g machine hours).

5 0
3 years ago
Read 2 more answers
What are control layouts? What are the two primary control layout options?
Sveta_85 [38]

Answer:

The layouts that gives your form or report a unique and different appearance by controlling and arranging align vertically and horizontally is known as Control layouts.

Explanation:

There are two primary options of control layout, these are as follows:

  • Stacked: In this, controls are arranged in vertical from (paper form) and in left of each control having a label.
  • Tabular: In this, controls are arranged in the form of rows and columns (like spreadsheets) and across the top having a label.

8 0
3 years ago
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
3 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
What is the difference between posting and transfer in ICT please I need the answer before TMR​
Radda [10]

Answer: b

Explanation: trust

7 0
2 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • William has an internet connection that does not allow him to make calls when connected to the Internet. What internet service c
    8·2 answers
  • Fill in the blank
    11·1 answer
  • Write an application that inputs a telephone number as a string in the form (555) 555-5555. The application should use String me
    10·1 answer
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • Your desktop, internet explorer, and the media player can be started from this area on most computers
    9·1 answer
  • Issues with paper based records include a. time spent re-keying data, searching for paper copies, and filing. b. storage volume
    9·1 answer
  • To gain a competitive edge this year, the upper management of a global IT company has decided to focus on customer service, empl
    13·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!